Online Do-it-Yourself Security Risk Analysis Toolkit

We offer a secure, user-friendly online Security Risk Assessment (SRA) platform for small medical practices with limited resources and time, to identify and prioritize security risks and demonstrate MIPS/MACRA and HIPAA compliance. Our online SRA is optimized for multiple sites with up to 50 staff. For larger practices, we recommend our consulting services.

I have re-worked our original risk assessment … We are using databrackets Meaningful Use Security Risk Analysis toolkit and it meets our needs. It was easy to use and I believe that it is very beneficial to our meeting meaningful use. –B. Curtis, Neurosurgical Associates, TX

  • Easy-to-use web-based interactive tool
  • Download and print reports in hours
  • Our reports successfully accepted by auditors
  • Save money with self-assessment
  • Update action plans in real-ime
  • Keep yourself current with evolving security threats

Online DIY Security Risk Analysis Toolkit Demo


online HIPAA risk assessmentOrganize, Analyze, and Report your Security Risks

– Know your risks along with appropriate measures
– Evaluate impact to different technology assets
– Track exposures, prioritize risks, develop a mitigation plan using pre-populated solutions (optional) or customized approach
– Download and print your reports in hours

online HIPAA risk assessmentMeet Meaningful Use/MACRA/MIPS Security Risk Analysis Requirements

– Be prepared for meaningful use/MACRA/MIPS  audits
– Build on your previous year’s report to meet annual attestation requirements

Comply with One of the Key Requirements of HIPAA/HITECH

online HIPAA risk assessment– Electronic patient data security risk analysis is the key component of HIPAA/HITECH
– Cover yourself from OCR/HHS audit
– OCR/HHS phase 2 audit is underway

online HIPAA risk assessmentEven If It’s Random, It’s Still an Audit

– A certified security professional reviews your report and provides recommendations with our consulting option
– Protect your hard earned reputation and money
– Minimize patient data breach penalties

online HIPAA risk assessmentAnd More Ways to Help Meet Your Goals …

– Policies and procedures template is included
– End user security awareness training
– External network vulnerability scan
– Required documents organized securely on our portal

Want to learn more about partnership/white label opportunities? We have partner program for practice management groups/IT vendors

Frequently Asked Questions

What is an Online Interactive Security Risk Assessment Tool?

It is a web-based tool that allows you to perform a technology security risk assessment of your Protected Health Information (PHI) for a typical small medical practice*. For multi site medical practices, our consulting service is a good option. 

Who is the Tool for?

This tool can be used by anyone wishing to assess healthcare PHI-related security risks that might exist in a practice that uses electronic devices like Networking equipment, desktops, laptops, mobile devices, servers, etc.

What do I have to do?

It is a 5-step process:

Step 1: Preparation introduces the user (practice) to the risk assessment

Step 2: In identification the user goes through the risks (structured in modules / submodules) and answers YES or NO to the statements. These are always affirmative statements for consistency and are arranged in a logical order.

Step 3: Evaluation for each problem spotted, the end-user evaluates the risk

Step 4: Action Plan is filled in with measures to tackle all stated risks

Step 5: Report the action plan is converted into a report to be downloaded and printed

How long will it take?

It’s impossible to say how long an assessment will take in general as the tools differ according to your practice setup. Usually, it should not take more than 2 to 3 hours to complete your assessment.

Do I need to prepare?

You do not need any kind of specific preparation to start using the tool, however you should take some time to think about who is going to carry out the risk assessment, how your IT and other people involved in PHI are going to be involved in the process, etc.


Explore more of our services: